ASFF 中的 AwsEventBridge 资源
以下是 AwsEventBridge 资源的 AWS 安全调查发现格式(ASFF)的示例。
AWS Security Hub CSPM 会将各种来源的调查发现标准化为 ASFF。有关 ASFF 的背景信息,请参阅 AWS安全调查发现格式 (ASFF)。
AwsEventSchemasRegistry
AwsEventSchemasRegistry 对象提供有关 Amazon EventBridge 架构注册表的信息。架构定义发送到 EventBridge 的事件的结构。架构注册表是收集架构并对其进行逻辑分组的容器。
以下示例显示了 AwsEventSchemasRegistry 对象的 AWS 安全调查发现格式 (ASFF)。要查看 AwsEventSchemasRegistry 属性的描述,请参阅 AWS Security Hub CSPM API 参考中的 AwsEventSchemasRegistry。
示例:
"AwsEventSchemasRegistry": { "Description": "This is an example event schema registry.", "RegistryArn": "arn:aws:schemas:us-east-1:123456789012:registry/schema-registry", "RegistryName": "schema-registry" }
AwsEventsEndpoint
AwsEventsEndpoint 对象提供有关 Amazon EventBridge 全局端点的信息。端点可以通过使其具有区域容错能力来提高应用程序的可用性。
以下示例显示了 AwsEventsEndpoint 对象的 AWS 安全调查发现格式 (ASFF)。要查看 AwsEventsEndpoint 属性的描述,请参阅 AWS Security Hub CSPM API 参考中的 AwsEventsEndpointDetails。
示例:
"AwsEventsEndpoint": { "Arn": "arn:aws:events:us-east-1:123456789012:endpoint/my-endpoint", "Description": "This is a sample endpoint.", "EndpointId": "04k1exajoy.veo", "EndpointUrl": "https://04k1exajoy.veo.endpoint.events.amazonaws.com", "EventBuses": [ { "EventBusArn": "arn:aws:events:us-east-1:123456789012:event-bus/default" }, { "EventBusArn": "arn:aws:events:us-east-2:123456789012:event-bus/default" } ], "Name": "my-endpoint", "ReplicationConfig": { "State": "ENABLED" }, "RoleArn": "arn:aws:iam::123456789012:role/service-role/Amazon_EventBridge_Invoke_Event_Bus_1258925394", "RoutingConfig": { "FailoverConfig": { "Primary": { "HealthCheck": "arn:aws:route53:::healthcheck/a1b2c3d4-5678-90ab-cdef-EXAMPLE11111" }, "Secondary": { "Route": "us-east-2" } } }, "State": "ACTIVE" }
AwsEventsEventbus
AwsEventsEventbus 对象提供有关 Amazon EventBridge 全局端点的信息。端点可以通过使其具有区域容错能力来提高应用程序的可用性。
以下示例显示了 AwsEventsEventbus 对象的 AWS 安全调查发现格式 (ASFF)。要查看 AwsEventsEventbus 属性的描述,请参阅 AWS Security Hub CSPM API 参考中的 AwsEventsEventbusDetails。
示例:
"AwsEventsEventbus": "Arn": "arn:aws:events:us-east-1:123456789012:event-bus/my-event-bus", "Name": "my-event-bus", "Policy": "{\"Version\":\"2012-10-17\", \"Statement\":[{\"Sid\":\"AllowAllAccountsFromOrganizationToPutEvents\",\"Effect\":\"Allow\",\"Principal\":\"*\",\"Action\":\"events:PutEvents\",\"Resource\":\"arn:aws:events:us-east-1:123456789012:event-bus/my-event-bus\",\"Condition\":{\"StringEquals\":{\"aws:PrincipalOrgID\":\"o-ki7yjtkjv5\"}}},{\"Sid\":\"AllowAccountToManageRulesTheyCreated\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::123456789012:root\"},\"Action\":[\"events:PutRule\",\"events:PutTargets\",\"events:DeleteRule\",\"events:RemoveTargets\",\"events:DisableRule\",\"events:EnableRule\",\"events:TagResource\",\"events:UntagResource\",\"events:DescribeRule\",\"events:ListTargetsByRule\",\"events:ListTagsForResource\"],\"Resource\":\"arn:aws:events:us-east-1:123456789012:rule/my-event-bus\",\"Condition\":{\"StringEqualsIfExists\":{\"events:creatorAccount\":\"123456789012\"}}}]}"